|Publication number||US6181814 B1|
|Application number||US 09/115,315|
|Publication date||Jan 30, 2001|
|Filing date||Jul 14, 1998|
|Priority date||Jan 18, 1996|
|Also published as||CA2243242A1, US5781654, WO1997026618A1|
|Publication number||09115315, 115315, US 6181814 B1, US 6181814B1, US-B1-6181814, US6181814 B1, US6181814B1|
|Inventors||James F. Carney|
|Original Assignee||Merrill Lynch & Co. Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (10), Non-Patent Citations (4), Referenced by (113), Classifications (18), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a Continuation of patent application Ser. No. 08/588,105, filed on Jan. 18, 1996, and now issued as U.S. Pat. No. 5,781,654.
The present invention generally relates to a computer system and data processing techniques for detecting fraud and abuse in commercial instruments. More particularly, the present invention relates to a data processing system that works in concert with specifically delineated software to ensure checks issued and presented through the banking system contain no material alterations to printed check information, such as the payee name, issue date, check number and check amount.
For many centuries, money has been used to permit market transactions of goods and services. Money was often in the form of coinage and other types of currency and thus immediately liquid—and subject to immediate loss. To expand the available transactions, banks became available to extend credit for goods and services in the market. Such credit extensions were leveraged on deposits and took the form of various types of commercial paper including promissory notes, letters of credit, drafts and, more commonly, checks on account. These financial instruments have provided substantial capital and increased asset liquidity and thus supported greater—debt based—economic growth.
However, transactions based on paper have long suffered significant losses as a result of acts of fraud. Specifically, paper was easily stolen and modified in ways that misled the drawee bank into inappropriately releasing check defined currency. For the most part, this involved altering the check in a way undetectable to the bank. When presented for payment, the modified check would be honored with the resulting financial loss to be allocated between the drawee bank (bank of first deposit) and check writer of the funds usurped by the altered or fraudulently created check.
To combat this fraud, banks have employed many techniques for confirming check validity. For example, checks will routinely include information about the drawing account and amount to be drawn. Special patterns and designations are applied to the blank paper check stock to discourage replication. In fact, centuries ago, checks required a personal “chop” to permit cashing.
Notwithstanding these techniques, modern practices of check writing and encashment remains mired in scams and fraud, resulting in billions of dollars of lost funds and is growing at an alarming rate due to the use of technology such as image scanners, personal computers and laser printers. Moreover, banks and other institutions are responsible for cashing many pre-printed checks of the type now typically used for payroll, dividends, etc. These checks are computer generated by the check issuer with specialized accounting software to track the transactions on an aggregate basis and to record individual account activity. In some ways, these automated issuance systems make it easier for check forgers to alter or reproduce fraudulent checks. Banks also, in an effort to reduce the costs of processing presented checks and posting them to customer accounts, have implemented sophisticated equipment and software to greatly automate these processes. One of the unfortunate results of this automation, however, is that fewer customer checks are physically handled and reviewed by bank personnel, making it more likely that these reproductions of originally issued checks with altered payees will go undetected. Even when physically inspected, however, many of these falsified items so clearly match the appearance of an original check drawn on the same customer account that the counterfeit is still not detected. These types of fraudulent items are resulting in losses of approximately five billion dollars per year and are growing at an alarming rate.
As an example of this widespread type of check fraud, in 1993, two checks for $80,000.00 were stolen from the Philadelphia Post Office. These checks included a printed name identifying the payee on the check. In addition, these checks included information of the check number, account number and dollar amount. The fraud was perpetrated by creating a duplicate check in the same font/typeface on security paper with MICR (Magnetic Ink Character Recognition) encoding used by banks to read the key pieces of information about a check in an automated fashion. This was done so the copy was identical to the check stock that was initially issued. The sole difference from the original item was that the payee had been changed. An account had been opened in the fictitious payee's name and the duplicate check was deposited into the account. The duplicated check was presented for payment and the funds were transferred to the falsified account, which was then closed out after the deposit funds were withdrawn. Since the check number, account number and the amount were all accurate, and the check appeared to be the original, the check was honored and the fraud uncovered only after the funds had been removed from the fictitious payee's account.
The foregoing example is not a lone event. Similar schemes are being perpetrated by check fraud rings worldwide at an astounding rate. Computer generated paychecks for stock dividends, payrolls and similar automated check preparation systems are now used extensively throughout the U.S. to issue millions of checks each day. Each check must include the printed payee as discussed above, and thus each is subject to the same kind of potential fraud. To prevent this and other types of fraud, the present invention has been created.
It is an object of the present invention to provide a data processing system for managing check preparation and processing to prevent check alteration.
It is another object of the present invention to provide a data processor for confirming validity of checks presented for payment in a manner that precludes payee substitution.
The above and other objects of the present invention are realized in a unique data processing system that reads, interprets, and converts alpha characters found in payee names to a numeric value. The numeric information from the payee is combined with selected information from the MICR line and other parts of the check (check number, account number, issue date and dollar amount), and the combined information is used in a check digit routine. The result of the check digit routine is conveyed to the drawee bank. The drawee bank will use this information to validate the check upon presentment before final payment. The method used to convey the check digit routine can vary. The check digit information can be transmitted to the drawee bank as part of the current Positive Pay file within which the check issuer provides the drawee bank with a list of checks issued against which the bank can match items such as the check number, account number and dollar amount when presented for payment. Alternatively or in addition thereto, the value of the check digit may be placed on the face of the check in the “aux on us” field in the MICR line or on the face of the check, via the check issuance system.
In accordance with the varying aspects of the present invention, a first computer system is used to manage the check printing and accounting process. This computer system includes additional software processes for generating a numerical coded value corresponding to, among other things, the individual name of the payee—a numeric value that is based on the transformation of the alpha characters of the payee.
The check issuer and the corresponding drawee bank will agree on a set or sets of numeric manipulations (hereinafter referred to as the “algorithm”) to be employed for the specific customer's checks that will result in the check digit. This algorithm can vary by customer, by drawee account, by check serial range, or by check if needed. To protect against fraud, the algorithms are shared only by the check issuer and the drawee bank and only disclosed to other interested parties as agreed to by the check issuer and the bank.
A second computer system, located at the drawee bank, will have complementary software. This second system is also programmed to track and record disbursements associated with checks presented for payment by customer account. In addition, the system will recalculate the numeric value of the check digit using the agreed upon algorithm and compare it to the original check digit calculated when the check was issued. Any discrepancies will be reviewed by bank and check issuer personnel to determine the validity of the item(s) prior to final payment.
The foregoing features of the present invention are more fully and readily understood from the following detailed description of the presently preferred embodiments and presently preferred methods of practicing the invention.
The invention will become more readily apparent from the following description of a specific illustrative embodiment thereof presented hereinbelow in conjunction with the accompanying drawings, of which:
FIG. 1 depicts a typical check of the type used with the present invention;
FIG. 2 depicts a functional block diagram of the key hardware components of the present invention;
FIG. 3 depicts a logic flow chart for the computer management controlling logic for the present invention relating to the check issuance process; and
FIG. 4 depicts a logic flow chart for the computer management controlling logic for the present invention relating to the check review process by the drawee bank.
First briefly in overview, the present invention provides a computer programmed apparatus and process integrated into a fraud prevention system utilized by both sides of check processing transactions. The check issuance workflow begins the process, with a computer controlled accounting and printing system. This system generates a plurality of checks of varying amounts, bank accounts and payees. This is iteratively processed with the resulting checks physically generated via per se well-known high speed printers. The checks are then typically sorted and placed in individual envelopes for mailing to the designated individuals or corporate payees. The check amounts, payee and account data are tracked and the system databases are updated after a batch run.
For each payee, the system selectively assesses the payee's alpha-characters and using a pre-determined specialized algorithm, calculates a corresponding numeric rendition of the payee name either alone or in combination with other payee/check information, and ultimately, a corresponding check digit value. During the printing process, the check digit of this numeric rendition is applied to the check MICR Line or some other location on the check face prior to passing the check to the enveloping process, or it is captured and transmitted later as part of the check issuance file sent to the drawee bank.
The second aspect of the inventive system involves the check presentation processing. The system provides a second computer remote from the printing system and typically found at the drawee bank where checks will be presented. This computer hardware and software will track the receipt of the presented checks in conventional means, recording each presented check for posting against the check issuer's account(s).
The computer system will further include the enhancement of being able to use digital image technology or other ICR (Intelligent Character Recognition) to locate and interpret the printed payee and/or other relevant fields on the check including but not limited to the check serial number, dollar amount and issue date. The alpha characters in the payee name will be captured, “recognized” by the software, and converted to numerics according to a pre-defined algorithm. A check digit is calculated. This is then compared to the expected check digit received from the issuer or otherwise printed on the check. A match between the expected and calculated check digit confirms that the selected relevant fields such as the payee name, dollar amount, issue date and check number have not been altered.
With the foregoing background in mind, attention is first directed to FIG. 1, wherein a typical check is depicted having certain common characteristics important for understanding the instant invention. In particular, the check will have a payee designated 10, (in this example the payee's name is John Jones) which is typed in the central portion of the check and an issues date 20. The payee name and issue date are printed in a character font that is readable by the image scanner. The check includes other ancillary indicia, and several special purpose printed regions, including the MICR line comprised of the check number 30, the account number 40, and the amount of the check 50. To implement the present fraud detection system, the MICR line is augmented with a further numeric value—which may be encoded in the “Aux on us” field which is not shown. If the MICR line is not used, the check digit value may be placed on another check face location, pre-defined by the parties to the transaction, see for example item 60 in FIG. 1. Also, the algorithms are assigned identifying numbers—the number of the selected algorithm being placed on the check along with the check digit so that the drawee bank will know which algorithm to employ. As mentioned before, an alternative is to leave the check free of the check digit value and algorithm number, and electronically transmit the check digit to the drawee's bank in the paid issuance file. The coordination of algorithm selection may be by other means as found appropriate under the circumstances.
For example, to implement multiple algorithm use, authorized individuals of the check issuer and drawee bank agree on one or more algorithms that will be employed. A selected algorithm may use a selected combination of information (payee name, check number, account number, issue date and dollar amount) to calculate the check digit. Often, the algorithm uses the payee name and possibly other check and payee information in its calculations. In order to calculate the check digit, a first part of the algorithm involves converting all alpha characters of the check information to numerics. There are many possible ways to establish the alpha conversion of the payee value to a numeric code. One simple yet effective algorithm is delineated in Table 1 below herein each letter is sequentially assigned a corresponding numeric value.
. . .
. . .
In accordance with this simple transformation, the payee name “John Jones” is converted to the digital value 9147132691413418; this large value is then utilized in a second part of the algorithm. The second part of the algorithm involves converting the numeric value of the selected check/payee information along with the numeric value of the payee name to a check digit. Specifically, in this example, the individual values are multiplied by a constant (e.g., “371”). This procedure is repeated for the selected check information including the check number, issue date and account number with the resulting string of products summed to provide a final, composite value:
The calculated value 517 is subtracted from the next largest whole number that ends with zero (520) resulting in the value “3” as the check digit. For additional complexity and security, a second check digit can be formed from the sum of the digits (5+2+0=7), thus resulting in the payee check digit “73”, see item 60 of FIG. 1. In this example, the first three digits of item 60 “001” reflect the specific algorithm used to develop the check digit. In this way, one thousand (1,000) separate algorithms may be used in rotation.
The above calculations are illustrative of a transformation algorithm that combines the converted alpha characters from the payee name with the associated check number, issue date, account number and amount drawn to determine a positive identifying check digit value for imprinting onto the check face or transmission. The above algorithm is for illustrative purposes only, as it is contemplated that other numeric transformation techniques having greater complexity and security may be used.
Turning now to FIGS. 2A and 2B, a block diagrams depict the associated hardware used to implement the above fraud detection system. As presented therein, the system is segregated into two CPUs representing the check issuance and drawee bank process, blocks 100 and 200, respectively. These are general purpose digital computers having the memory and processing power commensurate with the level of processing demand placed on the CPU by the institution. Banks are traditionally heavy data processors and thus the CPUs are likely to be mainframe systems. With the advent of distributed processing, many aspects of mainframe processing are now done on a network of workstations and it is likely that such a network could also be used in conjunction with the present invention. Each computer system further comprises memory (blocks 140 and 240) for storage of the controlling programs and requisite data files, and communication ports (blocks 120 and 220) that permit transfer of data such as the electronic form of the paid issuance file (see below). A reader sorter, block 250, is used for reading and interpreting check MICR and other data, as well as for segregating checks in processing. The reader/sorter 250 further includes an image camera 260 for capturing the payee name and issue date from the face of the check when presented. These captured ALPHA and numeric characters are then converted to numeric values and combined with information read from the MICR line and the check digit routine is recalculated.
Both 130 and 210 have access to the same software to calculate and re-calculate the algorithmic check digit routines previously outlined in this document. The check issuance system further includes the printing system 110 for printing checks, and a communication subsystem for linking to other (possibly branch offices) locations for data transmission.
Turning now to FIG. 3, the controlling logic as it relates to the check fraud prevention system is depicted in flow chart form. Starting at block 300, logic for the check creating process is initiated. At block 310, the database for check generation is accessed. This is typically a batch process for e.g., payroll or the like. The system utilizes tracking or index variables (I) to index between entries in the database DB (I). Accordingly, each account (I) is processed sequentially, block 320, to discern if a check is to be prepared, test 330—if negative, logic branches to block 340 and the system indexes to the next entry, I=I+1.
If a check is to be generated, “yes” to test 330, logic proceeds to block 350 wherein the amount is selected (or calculated). Alternatively, it can be assumed that a check will issue for each payee name. At block 360, the account number and payee name are pulled, and the check number and issue date selected. At block 370, the algorithm number is parsed from memory and the corresponding algorithm pulled for use. It is expected that many distinct algorithms will reside in memory and be available for use. At block 380, the account values (name, number, issue date and check amount) are transformed in accordance with the governing algorithm—resulting in the check digit value (described above) reflecting the payee name with the associated check number, amount, and account information. The calculated value is stored, block 390, with the algorithm number and the process is then iteratively indexed through the entire batch for that run, block 400. Thereafter, test 410 discerns whether this is a print run; if yes, logic proceeds to block 420 to determine if the check digit is to be printed. If no, logic proceeds to block 430 and the check digit is stored in the paid issuance file, PI(X). In either event, logic proceeds to check printing block 440, in which checks are printed with or without the check digit number as determined above, and block 450 for check print confirmation.
Turning now to FIG. 4, the logic underlying the check confirmation process is delineated. The process is initiated at start block 500, and continues to block 510 wherein the check presented for payment is input into the system and given an index (J) for tracking during processing. The presented check is then scanned, block 520, with the payee and other check data included in the captured image. If the algorithm number and check digit are included on the face of the check they are also captured. At block 520 and 530, the MICR data is inputted and stored at (J) index value location in the system. The system at block 540 interprets the payee name and other appropriate check data, including the algorithm number and check digit if printed on the face or MICR line of the check, then applies the appropriate algorithm to the captured MICR line and image to generate a check digit value CD (J). At test 550, if the algorithm number and/or check digit are not found on the check, the system queries as to the existence of a paid issuance file, previously transferred from the drawee bank. If yes to test 550, logic branches to block 560 and paid issuance file is pulled, PI(X). At block 570, CD2(J) is pulled from the paid issuance file, and logic proceeds to test 580. CD(J) is pulled from its location and the logic proceeds to test 580. At test 580, the system compares the CD(J) with the CD2(J) read from the check or the paid issuance file; if a match exists, processing continues to block 600 and check (J) is passed.
However, if a match is not made, the system logic is branched to special processing sequence, block 590. In block 590, the specialized software will attempt to “re-read” the check information fields as necessary and re-test the resulting values to determine if the revised check digit matches that provided by the check issuer. This process may be necessary since the software which reads and interprets these fields may arrive at more than one possible letter or number for each value in the field. The software will iteratively evaluate all field positions for which more than one possible value exists to determine if the changed value will result in CD2(J) being equal to CD(J).
If it in successful in finding a value that will make CD2(J)=CD(J), logic proceeds to 600. If not, the image of the check in question will be displayed to an operator, along with the interpreted values from the payee name, issue date, check number, and check amount fields. The operator will visually inspect the check image and the interpreted values to determine if the software made an error in its interpretation of one or more of the fields. If it has, the operator will key the correct values, over-writing the errors made by the software. Once keying is completed, the algorithm software will again be invoked to recalculate the check digit using the appropriate algorithm and the revised field values. If the revised check digit is found equal to that calculated by the check issuer, the item is paid in block 600. If CD2(J) does not equal CD(J) in block 593, the image is passed to a second operator in block 594 who will contact the issuer and determine if the item should be returned to the bank of first deposit in block 595.
It should be noted that all of the processing outlined above occurring at the drawee bank occurs within right of return guidelines as outlined in the Uniform Commercial Code. As used herein, payee information includes at least the payee name, and optionally, the account number, check number and check amount.
The foregoing logic has been illustrated as sequential; as is universally recognized, many other approaches for accomplishing the same result are available including continuous processing, menu indexing, etc.; the use of the above recitation was selected to demonstrate the inventive concepts in a straight forward and illustrative manner.
Although the invention has been described in detail for the purpose of illustration, it is to be understood that such detail is solely for that purpose and that variations can be made therein by those skilled in the art without departing from the spirit and scope of the invention except as it may be limited by the claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3985998 *||Aug 17, 1973||Oct 12, 1976||Century International Corporation||Personal authority verification system|
|US3990558 *||Oct 7, 1974||Nov 9, 1976||Gretag Aktiengesellschaft||Method and apparatus for preparing and assessing payment documents|
|US4568936 *||Dec 31, 1984||Feb 4, 1986||Light Signatures, Inc.||Verification system for document substance and content|
|US5146512 *||Feb 14, 1991||Sep 8, 1992||Recognition Equipment Incorporated||Method and apparatus for utilizing multiple data fields for character recognition|
|US5341428 *||Jan 30, 1992||Aug 23, 1994||Gbs Systems Corporation||Multiple cross-check document verification system|
|US5432506 *||Feb 25, 1992||Jul 11, 1995||Chapman; Thomas R.||Counterfeit document detection system|
|US5509692 *||Jan 18, 1994||Apr 23, 1996||Be'eri Printers||Monetary instrument|
|US5550932 *||Jun 19, 1992||Aug 27, 1996||Pierce Companies, Inc.||Method for encoding MICR documents|
|US5781654 *||Jan 18, 1996||Jul 14, 1998||Merrill Lynch & Co., Inc.||Check authentication system utilizing payee information|
|US5890141 *||Jan 18, 1996||Mar 30, 1999||Merrill Lynch & Co., Inc.||Check alteration detection system and method|
|1||*||"How Banks Tackle the Tricks of the Trade," Euromoney, p90(2). Nov. 1986.|
|2||*||1992 ANSI Meeting Minutes document entitled "Meeting Minutes Fraud Prevention Document," Helene Kotonis-Chair, Sep. 30, 1992.|
|3||*||Gundlach et al., "AT&T Easylink Services Provides Telex Connection for AS/400," Business Wire (San Francisco, CA) s1 p1, Jan. 28, 1991.|
|4||*||Taylor, "Check Fraud: Preventive Measures for Businesses," Journal of Check Management, v12 n1, pp. 34-38, Jan./Feb. 1992.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6760470||Mar 2, 2000||Jul 6, 2004||Amazon.Com, Inc.||Extraction of bank routing number from information entered by a user|
|US6764015 *||Jun 25, 2002||Jul 20, 2004||Brent A Pearson||MICR line blocker-invisiMICR|
|US6808109 *||Oct 15, 2002||Oct 26, 2004||Terri Page||System and method for verifying the authenticity of a check and authorizing payment thereof|
|US7045394||Oct 26, 2004||May 16, 2006||Seiko Epson Corporation||Method of manufacturing semiconductor device and system of manufacturing semiconductor device|
|US7058612||Jul 3, 2002||Jun 6, 2006||Bottomline Technologies, (De) Inc.||System and method for producing and verifying secure negotiable instruments|
|US7072868 *||Feb 20, 2003||Jul 4, 2006||First Data Corporation||Methods and systems for negotiable-instrument fraud prevention|
|US7089213 *||Jun 4, 2002||Aug 8, 2006||Bottomline Technologies||System and method for producing and verifying secure negotiable instruments|
|US7110548 *||Aug 2, 1999||Sep 19, 2006||Hatachi Ltd||Cryptographic communication method, encryption algorithm shared control method, encryption algorithm conversion method and network communication system|
|US7133844||Jul 3, 2002||Nov 7, 2006||Bottomline Technologies (De) Inc.||System and method for producing and verifying secure negotiable instruments|
|US7178721||Feb 8, 2006||Feb 20, 2007||Vectorsgi, Inc.||Method and system for duplicate commercial paper detection|
|US7257246 *||May 7, 2003||Aug 14, 2007||Certegy Check Transaction Service, Inc.||Check cashing systems and methods|
|US7266527 *||Jun 30, 1999||Sep 4, 2007||Martin David A||Method and device for preventing check fraud|
|US7267264||Feb 21, 2006||Sep 11, 2007||Terri Page||System and method for verifying the authenticity of a check and authorizing payment thereof|
|US7366339 *||Sep 11, 2006||Apr 29, 2008||Electronic Imaging Systems Corporation||System and method for detecting cheque fraud|
|US7384890||Dec 30, 2004||Jun 10, 2008||Adp, Inc. (A Delaware Xcorporation||Check fraud protection techniques|
|US7440915||Nov 16, 2007||Oct 21, 2008||U.S. Bancorp Licensing, Inc.||Method, system, and computer-readable medium for reducing payee fraud|
|US7546261||Jul 2, 2004||Jun 9, 2009||Amazon Technologies, Inc.||Extraction of bank routing number from information entered by a user|
|US7584890||Jun 23, 2006||Sep 8, 2009||Global Payment Technologies, Inc.||Validator linear array|
|US7630924 *||Apr 20, 2005||Dec 8, 2009||Authorize.Net Llc||Transaction velocity counting for fraud detection|
|US7708201||Oct 31, 2007||May 4, 2010||Terri Page||System and method for verifying the authenticity of a check and authorizing payment thereof|
|US7739499||Feb 13, 2003||Jun 15, 2010||Servicios Especializados Y Tecnologia Informatica, S.A.||Check anti-fraud security system|
|US7747530||Sep 11, 2008||Jun 29, 2010||Meadow William D||Check authorization system and method|
|US7752136 *||Jul 10, 2001||Jul 6, 2010||Meadow William D||Check authorization system and method|
|US7757951||Aug 14, 2006||Jul 20, 2010||Global Payment Technologies, Inc.||Information readers, apparatuses including information readers, and related methods|
|US7783563 *||Dec 9, 2003||Aug 24, 2010||First Data Corporation||Systems and methods for identifying payor location based on transaction data|
|US7890426||Nov 19, 2004||Feb 15, 2011||Vectorsgi, Inc.||Method and system for verifying check images|
|US7933835||Jan 17, 2007||Apr 26, 2011||The Western Union Company||Secure money transfer systems and methods using biometric keys associated therewith|
|US7983468 *||Feb 9, 2005||Jul 19, 2011||Jp Morgan Chase Bank||Method and system for extracting information from documents by document segregation|
|US8010454||Jul 19, 2010||Aug 30, 2011||Paper Payment Services Llc||System and method for preventing fraud in check orders|
|US8112333||Oct 17, 2007||Feb 7, 2012||Hartford Fire Insurance Company||System and method for processing payroll related insurance premiums|
|US8229093||Feb 6, 2007||Jul 24, 2012||Martin David A||Method for marketing to audience members based upon votes cast by audience members|
|US8290845 *||Oct 20, 2010||Oct 16, 2012||Fis Financial Compliance Solutions, Llc||System and method for presenting quasi-periodic activity|
|US8355971||Dec 29, 2011||Jan 15, 2013||Hartford Fire Insurance Company||System and method for processing payroll related insurance premiums|
|US8369601||Dec 10, 2002||Feb 5, 2013||Ncr Corporation||Method of processing a check in an image-based check processing system and an apparatus therefor|
|US8438049||Aug 2, 2011||May 7, 2013||Hartford Fire Insurance Company||System and method for processing data related to group benefit insurance having critical illness coverage|
|US8452623||Oct 4, 2012||May 28, 2013||Hartford Fire Insurance Company||System and method for processing payroll-related employee and insurance data|
|US8504473||Mar 28, 2007||Aug 6, 2013||The Western Union Company||Money transfer system and messaging system|
|US8515787||Dec 16, 2009||Aug 20, 2013||Hartford Fire Insurance Company||System and method for processing and transmitting payroll-related data for insurance transactions|
|US8639062||Oct 9, 2007||Jan 28, 2014||Bank Of America Corporation||Ensuring image integrity using document characteristics|
|US8639539||May 24, 2013||Jan 28, 2014||Hartford Fire Insurance Company||System and method for processing payroll-related insurance data|
|US8712807||Dec 31, 2012||Apr 29, 2014||Hartford Fire Insurance Company||System and method for determining payroll related insurance premiums|
|US8762267||Jun 19, 2013||Jun 24, 2014||The Western Union Company||Money transfer system and messaging system|
|US8788377||Jan 9, 2006||Jul 22, 2014||Ezshield, Inc.||System and method for providing recovery for victims of check fraud|
|US8818904||Jan 17, 2007||Aug 26, 2014||The Western Union Company||Generation systems and methods for transaction identifiers having biometric keys associated therewith|
|US9070129||Sep 2, 2008||Jun 30, 2015||Visa U.S.A. Inc.||Method and system for securing data fields|
|US9123044||Jun 29, 2014||Sep 1, 2015||The Western Union Company||Generation systems and methods for transaction identifiers having biometric keys associated therewith|
|US9536112 *||Jun 13, 2012||Jan 3, 2017||Stmicroelectronics Asia Pacific Pte Ltd.||Delaying or deterring counterfeiting and/or cloning of a component|
|US20020013899 *||Jun 18, 2001||Jan 31, 2002||Faul Jacob Joel||Automated document distribution and transaction verification|
|US20020067827 *||Dec 4, 2000||Jun 6, 2002||Kargman James B.||Method for preventing check fraud|
|US20020075283 *||Dec 14, 2001||Jun 20, 2002||Payne Bradley A.||Systems and methods for voxel warping|
|US20020087463 *||Dec 28, 2000||Jul 4, 2002||First Data Corporation||Method and system for authorizing negotiable instrument encashment|
|US20020172731 *||Jun 27, 2002||Nov 21, 2002||Usha Goswami||Biologically active chloroform fraction of an extract obtained from a mangrove plant Salvadora persica L|
|US20020174074 *||Jul 10, 2001||Nov 21, 2002||Payformance Corporation||Check authorization system and method|
|US20020184152 *||May 20, 2002||Dec 5, 2002||Martin David A.||Method and device for preventing check fraud|
|US20030110111 *||Dec 9, 2002||Jun 12, 2003||Nalebuff Barry J.||Home equity insurance financial product|
|US20030110122 *||Dec 7, 2001||Jun 12, 2003||Nalebuff Barry J.||Home equity insurance financial product|
|US20030219122 *||Feb 13, 2003||Nov 27, 2003||Servicios Especializados Y Tecnologia Informatica, S.A.||Check anti-fraud security system|
|US20030225695 *||Jul 3, 2002||Dec 4, 2003||Bottomline Technologies (De) Inc.||System and method for producing and verifying secure negotiable instruments|
|US20030225704 *||Jun 4, 2002||Dec 4, 2003||Bottomline Technologies (De) Inc.||System and method for producing and verifying secure negotiable instruments|
|US20030225705 *||Jul 3, 2002||Dec 4, 2003||Bottomline Technologies (De) Inc.||System and method for producing and verifying secure negotiable instruments|
|US20030225708 *||Jul 3, 2002||Dec 4, 2003||Bottomline Technologies (De) Inc.||System and method for producing and verifying secure negotiable instruments|
|US20040071333 *||Dec 5, 2002||Apr 15, 2004||Electronic Imaging Systems Corporation||System and method for detecting cheque fraud|
|US20040109597 *||Dec 10, 2002||Jun 10, 2004||Ncr Corporation||Method of processing a check in an image-based check processing system and an apparatus therefor|
|US20040138975 *||Nov 5, 2003||Jul 15, 2004||Lisa Engel||System and method for preventing fraud in check orders|
|US20040138991 *||Aug 21, 2003||Jul 15, 2004||Yuh-Shen Song||Anti-fraud document transaction system|
|US20040167860 *||Feb 20, 2003||Aug 26, 2004||First Data Corporation||Methods and systems for negotiable-instrument fraud prevention|
|US20040236690 *||Jul 2, 2004||Nov 25, 2004||Bogosian Matthew T.||Extraction of bank routing number from information entered by a user|
|US20050118791 *||Oct 26, 2004||Jun 2, 2005||Shiro Sato||Method of manufacturing semiconductor device and system of manufacturing semiconductor device|
|US20050125337 *||Dec 9, 2003||Jun 9, 2005||Tidwell Lisa C.||Systems and methods for identifying payor location based on transaction data|
|US20050182729 *||Feb 14, 2005||Aug 18, 2005||Kananen Guy M.||Method of preventing counterfeiting|
|US20050225897 *||Apr 13, 2004||Oct 13, 2005||Headway Technologies, Inc.||Heat extractor for magnetic reader-writer|
|US20060080245 *||Sep 30, 2005||Apr 13, 2006||Bottomline Technologies (De) Inc.||Negotiable instrument clearing server and method|
|US20060112013 *||Nov 19, 2004||May 25, 2006||Maloney Rian R||Method and system for verifying check images|
|US20060122933 *||Jan 9, 2006||Jun 8, 2006||Custom Direct, Inc.||System and method for providing recovery for victims of check fraud|
|US20060124730 *||Feb 8, 2006||Jun 15, 2006||Vectorsgi, Inc., A Delaware Corporation||Method and system for duplicate commercial paper detection|
|US20060145469 *||Dec 30, 2004||Jul 6, 2006||Automatic Data Processing, Inc.||Check fraud protection techniques|
|US20060177118 *||Feb 9, 2005||Aug 10, 2006||Jp Morgan Chase Bank||Method and system for extracting information from documents by document segregation|
|US20060180651 *||Feb 21, 2006||Aug 17, 2006||Terri Page||System and method for verifying the authenticity of a check and authorizing payment thereof|
|US20070040029 *||Aug 14, 2006||Feb 22, 2007||Thomas Mazowiesky||Information readers, apparatuses including information readers, and related methods|
|US20070043668 *||Jul 3, 2006||Feb 22, 2007||First Data Corporation||Methods and systems for negotiable-instrument fraud prevention|
|US20070064991 *||Sep 11, 2006||Mar 22, 2007||Electronic Imaging Systems Corporation||System and method for detecting cheque fraud|
|US20070112648 *||Feb 6, 2007||May 17, 2007||Martin David A||Method for marketing to audience members based upon votes cast by audience members|
|US20080054064 *||Sep 10, 2007||Mar 6, 2008||Terri Page||System and method for verifying the authenticity of a check and authorizing payment thereof|
|US20080091603 *||Oct 31, 2007||Apr 17, 2008||Terri Page||System and method for verifying the authenticity of a check and authorizing payment thereof|
|US20080169345 *||Jan 17, 2007||Jul 17, 2008||The Western Union Company||Generation Systems And Methods For Transaction Identifiers Having Biometric Keys Associated Therewith|
|US20080172342 *||Jan 17, 2007||Jul 17, 2008||The Western Union Company||Secure Money Transfer Systems And Methods Using Biometric Keys Associated Therewith|
|US20080243690 *||Mar 28, 2007||Oct 2, 2008||The Western Union Company||Money Transfer System And Messaging System|
|US20080270206 *||Jan 22, 2008||Oct 30, 2008||United States Postal Service||Method for detecting suspicious transactions|
|US20090010427 *||Sep 11, 2008||Jan 8, 2009||Meadow William D||Check Authorization System and Method|
|US20090063354 *||Sep 2, 2008||Mar 5, 2009||John Foxe Sheets||Account transaction fraud detection|
|US20090092309 *||Oct 9, 2007||Apr 9, 2009||Bank Of America Corporation||Ensuring image integrity using document characteristics|
|US20090106053 *||Oct 17, 2007||Apr 23, 2009||Mervin Walker||System and method for processing payroll related insurance premiums|
|US20100010837 *||Jul 9, 2008||Jan 14, 2010||Hartford Fire Insurance Company||System and method for use in billing for group benefit insurance|
|US20100042536 *||Aug 14, 2009||Feb 18, 2010||Tim Thorson||System and method of transferring funds|
|US20100094666 *||Dec 16, 2009||Apr 15, 2010||Hartford Fire Insurance Company||System and method for processing and transmitting payroll-related data for insurance transactions|
|US20100299258 *||May 4, 2010||Nov 25, 2010||Terri Page||System and method for verifying the authenticity of a check and authorizing payment thereof|
|US20110016031 *||Jul 19, 2010||Jan 20, 2011||Paper Payment Services Llc||System and method for preventing fraud in check orders|
|US20110099098 *||Aug 25, 2010||Apr 28, 2011||Deluxe Corporation||System for managing and reporting financial account activity|
|US20120101925 *||Oct 20, 2010||Apr 26, 2012||Memento Inc.||System and method for visualizing checking account information|
|US20120101926 *||Oct 20, 2010||Apr 26, 2012||Memento Inc.||System and method for presenting quasi-periodic activity|
|US20120158582 *||Dec 20, 2010||Jun 21, 2012||Ebay Inc.||Payment system using images|
|US20120317662 *||Jun 13, 2012||Dec 13, 2012||Stmicroelectronics, Inc.||Delaying or deterring counterfeiting and/or cloning of a component|
|US20130110725 *||Dec 19, 2012||May 2, 2013||Ezshield, Inc.||System and Method for Providing Recovery for Victims of Check Fraud|
|US20130211984 *||Dec 19, 2012||Aug 15, 2013||Ezshield, Inc.||System and Method for Providing Recovery for Victims of Check Fraud|
|CN1781073B||Mar 11, 2004||Jun 1, 2011||普驰信息技术有限公司||Document processing method and system|
|WO2003069425A2 *||Feb 13, 2003||Aug 21, 2003||Servicios Especializados Y Tecnologia Informatica,||Check anti-fraud security system|
|WO2003069425A3 *||Feb 13, 2003||Nov 27, 2003||Rodolfo Ramirez||Check anti-fraud security system|
|WO2004097620A2 *||Mar 11, 2004||Nov 11, 2004||International Business Machines Corporation||Joined front end and back end document processing|
|WO2004097620A3 *||Mar 11, 2004||Jul 14, 2005||Ibm||Joined front end and back end document processing|
|WO2006055846A1||Nov 16, 2005||May 26, 2006||Vectorsgi, Inc.||Method and system for duplicate commercial paper detection|
|WO2009032858A2 *||Sep 3, 2008||Mar 12, 2009||Visa U.S.A. Inc.||Account transaction fraud detection|
|WO2009032858A3 *||Sep 3, 2008||May 7, 2009||John Foxe Sheets||Account transaction fraud detection|
|WO2009049328A1 *||Dec 8, 2008||Apr 16, 2009||Bank Of America Corporation||Ensuring image integrity using document characteristics|
|U.S. Classification||382/137, 705/45, 340/5.86|
|International Classification||G06Q20/04, G07D7/00, G07F7/12|
|Cooperative Classification||G07F7/12, G06Q20/042, G06Q20/04, G07F7/08, G07D7/00, G07D7/0047|
|European Classification||G06Q20/04, G06Q20/042, G07F7/12, G07D7/00, G07D7/00B8, G07F7/08|
|Jul 20, 2004||FPAY||Fee payment|
Year of fee payment: 4
|Jul 7, 2008||FPAY||Fee payment|
Year of fee payment: 8
|Aug 20, 2010||AS||Assignment|
Owner name: BANK OF AMERICA CORPORATION, NORTH CAROLINA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MERRILL LYNCH & CO., INC.;REEL/FRAME:024863/0522
Effective date: 20100806
|Jun 25, 2012||FPAY||Fee payment|
Year of fee payment: 12